157 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityA hybrid honeypot framework that combines low and high interaction honeypots for network security
A low-interaction SSH honeypot tool for recording authentication attempts.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.
A script for setting up a dionaea and kippo honeypot using Docker images.
A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.
High interaction honeypot solution for Linux systems with data control and integrity features.
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
HellPot is an endless honeypot that sends unruly HTTP bots to hell with grave consequences.
Ansible role for deploying and managing Bifrozt honeypots
OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
Honeypot for analyzing data with customizable services and logging capabilities.